Bugzilla – Bug 1212713
VUL-0: CVE-2015-20109: glibc: buffer overflow (read past end of buffer) in internal_fnmatch=>end_pattern with "**(!()" pattern
Last modified: 2023-06-26 08:42:51 UTC
CVE-2015-20109 end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-20109 https://bugzilla.redhat.com/show_bug.cgi?id=2217330 https://www.cve.org/CVERecord?id=CVE-2015-20109 http://www.cvedetails.com/cve/CVE-2015-20109/ https://sourceware.org/bugzilla/show_bug.cgi?id=18036
Everything already fixed, closing